MailEnable versions prior to 10.54 contain a reflected cross-site scripting (XSS) vulnerability in the InstanceScope parameter of /Mondo/lang/sys/Forms/CAL/compose.aspx. The InstanceScope value is not properly sanitized when processed via a GET request and is reflected inside a <script> block in the JavaScript variable var gInstanceScope. By supplying a crafted payload that terminates the existing PageLoad() function, inserts attacker-controlled script, and comments out remaining code, a remote attacker can execute arbitrary JavaScript in a victim’s browser. Successful exploitation can redirect victims to malicious sites, steal non-HttpOnly cookies, inject arbitrary HTML or CSS, and perform actions as the authenticated user.
History

Fri, 12 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Mailenable
Mailenable mailenable
CPEs cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*
Vendors & Products Mailenable
Mailenable mailenable
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Tue, 09 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Description MailEnable versions prior to 10.54 contain a reflected cross-site scripting (XSS) vulnerability in the InstanceScope parameter of /Mondo/lang/sys/Forms/CAL/compose.aspx. The InstanceScope value is not properly sanitized when processed via a GET request and is reflected inside a <script> block in the JavaScript variable var gInstanceScope. By supplying a crafted payload that terminates the existing PageLoad() function, inserts attacker-controlled script, and comments out remaining code, a remote attacker can execute arbitrary JavaScript in a victim’s browser. Successful exploitation can redirect victims to malicious sites, steal non-HttpOnly cookies, inject arbitrary HTML or CSS, and perform actions as the authenticated user.
Title MailEnable < 10.54 Reflected XSS in InstanceScope Parameter of CAL/compose.aspx
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-09T18:07:47.472Z

Updated: 2025-12-12T17:32:23.407Z

Reserved: 2025-04-15T19:15:22.598Z

Link: CVE-2025-34404

cve-icon Vulnrichment

Updated: 2025-12-12T17:32:20.430Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T18:15:50.970

Modified: 2025-12-09T19:39:48.687

Link: CVE-2025-34404

cve-icon Redhat

No data.